Analysing the Spread of Cyber-Attacks in Computer Networks: A Simulation Study
Analysing the Spread of Cyber-Attacks in Computer Networks: A Simulation Study |
||
|
||
© 2023 by IJETT Journal | ||
Volume-71 Issue-8 |
||
Year of Publication : 2023 | ||
Author : Shiju Rawther, S. Sathyalakshmi. |
||
DOI : 10.14445/22315381/IJETT-V71I8P203 |
How to Cite?
Shiju Rawther, S. Sathyalakshmi., "Analysing the Spread of Cyber-Attacks in Computer Networks: A Simulation Study," International Journal of Engineering Trends and Technology, vol. 71, no. 8, pp. 26-38, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I8P203
Abstract
Cyber-attack propagation in computer networks is a critical concern in network security. This study adopts a simulation approach to investigate the spread of cyber-attacks, drawing inspiration from the Kermack-McKendrick model, which models the spread of epidemic diseases. Furthermore, the study incorporates the learning effect by leveraging machine-learning techniques for intrusion detection in computer networks. The review of references encompasses a comprehensive exploration of machine learning-based intrusion detection systems, considering various algorithms such as support vector machines, genetic algorithms, and deep learning architectures. Additionally, the review delves into the application of machine learning techniques in detecting specific threats, including distributed denial-of-service (DDoS) attacks, botnet activities in cloud computing environments, and intrusions in the Internet of Things (IoT). Several references highlight the effectiveness of anomaly detection techniques, encompassing clustering, classification, and deep learning methods. Notably, the survey examines the UNSW-NB15 network dataset, which serves as a benchmark for evaluating intrusion detection algorithms. Incorporating fuzzy data mining, hybrid machine learning approaches, and optimized algorithms further enhances the accuracy and efficiency of intrusion detection systems.
The review also sheds light on the challenges associated with intrusion detection using machine learning, including the availability of suitable datasets, feature selection, and algorithm scalability. By analyzing the state-of-the-art machine learning techniques for network intrusion detection, the study establishes a taxonomy of approaches and identifies key research trends. Overall, this study presents a simulation-based investigation of cyber attack propagation, employing the KermackMcKendrick model. It further incorporates machine learning techniques to enhance intrusion detection in computer networks.
The review of references provides valuable insights into the application of machine learning algorithms and their effectiveness in combating cyber threats. The study contributes to the development of proactive defense strategies and establishes a foundation for future research in network security. The propagation of cyber-attacks in computer networks poses significant threats to information security and system integrity. This paper presents a simulation study that focuses on analyzing the spread of cyber-attacks using the Kermack-McKendrick model, which is widely used in epidemiology to study the dynamics of infectious diseases. In addition, the study incorporates the learning effect, considering that nodes in the network can acquire temporary immunity or enhanced defenses over time. The simulation results provide valuable insights into the propagation patterns and dynamics of cyber-attacks, highlighting the importance of considering the learning effect in modeling the spread of such attacks. The findings contribute to developing effective strategies for network defense and incident response.
Keywords
Kermack-McKendrick model, Cyber-attack, Network, Payoff, Equilibrium, Star network, Attack-link formation, Propagation Dynamics.
References
[1] W. O. Kermack, and A. G. McKendrick, "Contributions to the Mathematical Theory of Epidemics," Proceedings of the Royal Society of London, Series A, Containing Papers of a Mathematical and Physical Character, vol. 115, pp. 700-721, 1927.
[Publisher Link]
[2] P. Sihag et al., "Analyzing the Propagation Dynamics of Cyber-Attacks using the Kermack-Mckendrick Model," Journal of Network and Computer Applications, vol. 123, pp. 64-76, 2019.
[3] A. Al-Dweik, and K. Al-Khamaiseh, "Modeling the Spread of Computer Viruses using the Kermack-Mckendrick Model," International Journal of Computer Science, vol. 8, no. 3, pp. 75-80, 2011.
[4] A. Sasaki, and S. Sun, "Modeling the Spread of Computer Worms using the Kermack-Mckendrick Model," Applied Mathematical Modelling, vol. 38, pp. 5-6, pp. 1689-1696, 2014.
[5] H. Singh, and N. Aggarwal, "Modeling and Analysis of Cyber-Attack Propagation using Kermack-Mckendrick Model," Procedia Computer Science, vol. 85, pp. 337-344, 2016.
[6] W. Wang et al., "Modeling the Spread of Cyber-Attacks in Complex Networks using the Kermack-McKendrick Model," Proceedings of the International Conference on Computer Science and Artificial Intelligence, ACM, pp. 114-118, 2016.
[7] G. Dhiman et al., "A Kermack-McKendrick Model Based Approach for Analyzing the Spread of Targeted Cyber-Attacks," Proceedings of the International Conference on Data Engineering and Communication Technology, Springer, pp. 125-134, 2021.
[8] J. Li et al., "Modeling the Spread of Advanced Persistent Threats using the Kermack-Mckendrick Model," IEEE Access, vol. 7, pp. 186081-186090, 2019.
[9] Z. Xu et al., "Epidemic Modeling for Analyzing the Spread of Cyber-Attacks in Computer Networks," Journal of Applied Mathematics, 2014.
[10] D. Manrique et al., "Analyzing the Propagation of Malware in Computer Networks using Epidemiological Models," Security and Communication Networks, vol. 9, no. 9, pp. 822-836, 2016.
[11] X. Yang et al., "Analyzing the Spread of Ransomware using the Kermack-Mckendrick Model," Proceedings of the International Conference on Artificial Intelligence and Big Data, Springer, Cham, pp. 193-202. 2020.
[12] S. Kannan, and T. Pushparaj, "Creation of Testbed Security using Cyber-Attacks," SSRG International Journal of Computer Science and Engineering, vol. 4, no. 11, pp. 4-14, 2017.
[CrossRef] [Publisher Link]
[13] S. Mishra, and K. Goyal, "Modeling and Analysis of Cyber-Attack Propagation in Computer Networks," International Journal of Computer Applications, vol. 72, no. 11, 2013.
[14] X. Yang et al., "Modeling the Propagation of Phishing Attacks using the Kermack-Mckendrick Model," Proceedings of the International Conference on Advances in Computer Science and Information Technology, Springer, Singapore, pp. 115-122, 2021.
[15] S. Rajbhandari et al., "Modelling the Spread of Cyber-Attacks using an Epidemiological Approach," Proceedings of the International Conference on Emerging Security Technologies, IEEE, pp. 15-20, 2017.
[16] Shiju Rawther, and S. Sathyalakshmi, "Cyber Attack Link Formation in a Network," International Journal of Engineering Trends and Technology, vol. 71, no. 5, pp. 191-196, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Z. Zhang et al., "Modeling the Propagation of Social Engineering Attacks using the Kermack-Mckendrick Model," Proceedings of the International Conference on Information Networking, IEEE, pp. 334-339, 2019.
[18] A. Mousavi et al., "Modeling the Spread of Advanced Persistent Threats in Computer Networks using the SIR Model," Proceedings of the International Symposium on Security in Computing and Communications, Springer, Cham, pp. 365-377, 2021.
[19] R. Surendiran, "Secure Software Framework for Process Improvement," SSRG International Journal of Computer Science and Engineering, vol. 3, no. 12, pp. 19-25, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Z. Dong et al., "Modeling the Propagation of Zero-Day Attacks in Computer Networks using the Kermack-Mckendrick Model," Proceedings of the International Conference on Computational Intelligence and Data Science, Springer, Cham, pp. 163-172. 2022.
[21] M. Raut et al., "Analyzing the Spread of Social Network-Based Attacks using the Kermack-Mckendrick Model," Proceedings of the International Conference on Security, Privacy, and Applied Cryptography Engineering, Springer, Cham, pp. 179-191, 2021.
[22] S. Gomathi, and S. Parthiban, "Modeling the Propagation of Cyber-Attacks in Computer Networks using Fractional Order Kermack-Mckendrick Model," Proceedings of the International Conference on Computational Intelligence and Communication Technology, Springer, Singapore, pp. 179-190, 2022.
[23] Aditya Kharat et al., "Implementation of Defence Schemes for Phishing Attacks on Mobile Devices," SSRG International Journal of Computer Science and Engineering, vol. 6, no. 6, pp. 28-34, 2019.
[CrossRef] [Publisher Link]
[24] A. Verma et al., "Analyzing the Propagation Dynamics of Malware in Wireless Sensor Networks using the Kermack-Mckendrick Model," Proceedings of the International Conference on Innovations in Electronics, Communication and Computing, IEEE, pp. 1-5, 2021.
[25] H. Singh, and M. Singh, "Modeling and Analysis of Cyber-Attack Propagation in Computer Networks with Time Delay," Proceedings of the International Conference on Innovations in Power and Advanced Computing Technologies, IEEE, pp. 1-5, 2021.
[26] Q. A. Al-Wasae et al., "Analyzing the Spread of Malware in Social Networks using the Kermack-Mckendrick Model," Proceedings of the International Conference on Smart Computing and Communication, Springer, Singapore, pp. 1-8, 2021.
[27] R. Subramanian et al., "Modeling the Spread of Worm Attacks in Computer Networks using the Kermack-Mckendrick Model," Proceedings of the International Conference on Communication and Computing Systems, Springer, Singapore, pp. 1-6, 2022.
[28] S. Deshmukh, and R. P. Yadav, "Modeling and Analysis of Targeted Cyber-Attack Propagation using the Kermack-Mckendrick Model," Proceedings of the International Conference on Cyber Security and Privacy in Communication Systems, Springer, Singapore, pp. 1-10. 2022.
[29] Shiju Rawther, and S Sathyalakshmi, "Entropy Analysis of Cyber-Attack Propagation in Network," 13th International Conference on Computing Communication and Networking Technologies, pp. 1-4, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[30] V Vencelin Gino, and Amit KR Ghosh, "Enhancing Cyber Security Measures for Online Learning Platforms," SSRG International Journal of Computer Science and Engineering, vol. 8, no. 11, pp. 1-5, 2021.
[CrossRef] [Publisher Link]
[31] N. Chawla, and M. Bhasin, "Analyzing the Propagation of Cyber-Attacks in Software-Defined Networking using the Kermack-Mckendrick Model," Proceedings of the International Conference on Intelligent Computing, Communication and Devices, Springer, Singapore, pp. 43-53. 2022.
[32] Y. Tang et al., "Modeling the Spread of Insider Threats in Computer Networks using the Kermack-Mckendrick Model," Proceedings of the International Conference on Information and Communication Technology, Springer, Cham, pp. 213-224, 2022.
[33] S. K. Sood et al., "Modelling the Spread of Cyber Threats using Epidemic Dynamics," International Journal of Critical Infrastructure Protection, vol. 3, no. 3-4, pp. 134-142, 2010.
[34] S. Samanta et al., "Modeling the Spread of Malware in Mobile Ad Hoc Networks using the Kermack-Mckendrick Model," Proceedings of the International Conference on Wireless Networks and Mobile Communications, Springer, Cham, pp. 153-162, 2021.
[35] C. Zhang et al., "Modeling the Spread of Cyber-Attacks in Cloud Computing Environments using the Kermack-Mckendrick Model,” Proceedings of the International Conference on Information Technology and Applications, IEEE, pp. 1-7, 2019.
[36] J. Li et al., "Modeling the Spread of Cyber-Attacks in Internet of Things (Iot) Networks using the Kermack-Mckendrick Model," Proceedings of the International Conference on Internet of Things, Big Data and Security, Springer, Cham, pp. 59-68. 2021.